On the security of two public key cryptosystems using non-abelian groups
From MaRDI portal
Recommendations
Cited in
(10)- scientific article; zbMATH DE number 1868917 (Why is no real title available?)
- Theory of Cryptography
- scientific article; zbMATH DE number 2135342 (Why is no real title available?)
- scientific article; zbMATH DE number 1910393 (Why is no real title available?)
- scientific article; zbMATH DE number 1842507 (Why is no real title available?)
- Factorizations in the elementary abelian \(p\)-group and their cryptographic significance
- The Diffie-Hellman key exchange protocol and non-Abelian nilpotent groups
- Неабелевость группы наложения ключа и свойство $\otimes _{\mathbf{W}}$-марковости алгоритмов блочного шифрования
- Cryptanalysis of public key cryptosystems based on non-abelian factorization problems
- A nonlinear decomposition method in analysis of some encryption schemes using group automorphisms
This page was built for publication: On the security of two public key cryptosystems using non-abelian groups
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1877355)